A lot of two-factor authentication mechanisms use SMS to deliver single-use passphrase to the user. So how secure is it? Is it hard to intercept the SMS message containing the passphrase? Do mobile ...

I am starting a new job, and I have the choice to receive a phone from the company, or bring my own phone. I am considering using my own phone, to avoid having an extra device, but I want to better ...

Even since growing up, I've watched films in which the "bad guy" is repeatedly tracked down when they call the police or FBI or police force de jour. They always have "about 30 seconds". Regardless ...

I'm learning wireless penetration testing. It really is amazing. But it made me wonder, what about mobile phones? They are also means of wireless communication. So, our entire voice must be in the air ...

Today I started using a VPN on my phone (nexus 5), and after I switched on mobile data and turned off my WiFi, I received a text message from my carrier offering me roaming packages for Europe (which ...

I've recently enabled 2-factor auth on a number of web apps, mostly using Google Authenticator. Does this mean that the importance of a strong password on each site is reduced? I would prefer to use ...

Quick Question
Is it possible that I could call a mobile number, but have the call forwarded through another number active on a different phone that someone else has? I have had unlimited access to ...

I live in France. About 5-10 times, once every 1-2 months, I receive an automated computerized call that listens to me say "hello" there is silence for 5 seconds, and then there is a voice recording ...

im looking to use my smartphone purely as a portable computer, with no network functionality in order to protect my privacy, is removing the sim cards from it enough to airgap it or do i need to go ...

I presume that the main reason phone operators require a SIM card to get access to the network is due to security and/or authentication purposes.
Just wondering why this is? What does a SIM card do ...

I received an email from a prospective "client" in broken English. We have been going back and forth about services for a while and he wants me to text him. Is it possible for him to charge me some ...

When deploying a mobile phone best practices policy, one of the points which were raised was the requirement for the user to protect his SIM card with a PIN. The theory is that three failed attempts ...

Twitter released(some time ago) a new kit named Digits which allows the client to login with a phone number and an authorization code (received through sms). I find it great for the user experience ...

Is there any way for two people to securely authenticate each other without access to any special software (like PGP)? For example, when speaking over the phone or by sending SMSes to each other or ...

is there an easy way for particular governmental organizations (especially in
countries where freedom of speech is a problem) have some technology where
they can easily eavesdrop on cellphone internet ...

Has there been any cases where hackers have taken over the phone number to a business, by creating a phone number in the same area code, setting up a virtual PBX / Asterisk system, routing all calls ...

A little back story on the setup first; We have a Cisco VoIP setup at our remote office(where I'm at) and the main CCM/CCX/Unity setup is at the parent company across the US in Connecticut. We have ...

The news has been filled recently with the allegations that News of the World employees hacked into the voicemail inboxes of celebrities and crime victims. What flaw was exploited to accomplish this, ...

How safe is it to give sensitive information to someone over a phone line? Does it matter if the data was verbally spoken or if it was typed in?
Example: Opening an account with an internet provider ...

When i was dealing with an assistant of my bank through mobile call, she asked me to insert my bank login code after a beep.
I was wondering if this procedure is secure against a malicious agent who ...

A mate pulled a quality prank on me the other day by sending me a SMS via a Spoofed number. He's bought a SMS gateway and can set the message ID/phone number to be 'God' (or whatever he wants(letters ...

My website needs to verify phone numbers in order to ensure that customers claiming a business actually work there. The service calls and gives the customer a pin which they put into the site. Many ...

Sometimes when you call an administrative service it tells you "Dial 1 to access such service. Dial 2 to access some other service. Otherwise, dial 3."
No harm if somebody comes to learn I chose "2".
...